Please refer to the attached documents for the assignment. Assignment Details: 

Please refer to the attached documents for the assignment.
Assignment Details: 
Part I – Using the attached Requirements template, create a list of requirements for a Smart Highway with at least five (5) integrated Smart systems identified in your research with at least 40 requirements (total) for these five (5) Smart systems. PMI (2021) indicates “the term requirement generally refers to a customer need while specification refers to a detailed, usually technical description of how that need will be met” (para. 1). A Requirement states what a product must/will/can do or a quality it possesses. A Specification is a collection of requirements that are used in the design of that product. Do not include specifications (such as products that you discover) – just requirements. 
Part II – Write at least a 5 page Word document, double-spaced, detailing your proposed trip on a Smart Highway. The paper must include all five (5) of the integrated Smart systems identified in your research and two (2) requirements for each of the five (5) integrated Smart systems.  Your paper must include at least seven (7) references along with their in-text citations. Research must include scholarly references but can also include YouTube videos, websites, blogs, etc. on the Smart system(s). Also view YouTube videos on Augmented Reality and Virtual Reality to extend your research on how Smart systems may evolve over time. 
Submit your paper and your Requirements list, using the template provided.

In this lab, we will investigate the content and use of device addressing at the

In this lab, we will investigate the content and use of device addressing at the Data Link layer.  The lab includes investigation of hardware addressing on your own computing device as well analysis of Data Link Layer addressing information in network traffic, using Wireshark to examine a packet capture (pcap) file. Download the attached instructions for this exercise. When you have completed the lab, click on the assignment link to submit your finished work.

  Too often, statistics are used to ‘prove’ some point or to persuade an audienc

 
Too often, statistics are used to ‘prove’ some point or to persuade an audience to some particular point of view, without really being accurate, complete, or honest. This issue has been the subject of numerous texts. You may be interested in reading such titles as: Damned Lies and Statistics, or How to Lie with Statistics. To fulfill this discussion board activity, complete the following:
Research one example where data analysis might have been misused or misapplied. Read about the example thoroughly so that you understand how analytics was used, and why it was problematic.
Share your chosen example, documenting your source. Be sure to summarize the scenario thoroughly.
Explain why use of analytics contributed to the problem.
Discuss the consequences of the matter. Did the company/organization involved suffer any adverse consequences? If so, were the related to public opinion/trust, were they financial, were they punitive, etc.?

  Research some common issues with data formatting, transfer, and manipulation

 
Research some common issues with data formatting, transfer, and manipulation. In APA format, write 3 paragraphs describing some of the issues you learned about. Describe why such issues might represent a problem for data analysts. Cite at least three sources in APA format. .

  Consider firewall placement on a network. There are better placements and some

 
Consider firewall placement on a network. There are better placements and some that can actually negate the benefit and purpose of adding a firewall to the network. What advice can you provide that would benefit a cybersecurity analyst if they were tasked with network security.

Overview You work for Strategic Security Consulting Group (SSCG). Recently, one

Overview
You work for Strategic Security Consulting Group (SSCG). Recently, one of your clients in Los Angeles, North Star Software Developers (NSSD), called with a big problem. Some of its network servers were compromised, resulting in the possible loss of personal information and credit card numbers of purchasers of the company’s software products. It is not presently known whether this attack came from inside or outside of the company. NSSD is currently dealing with this problem as best as it can, but it needs your company to help prevent this from happening again in the future.
Prompt
You have been assigned to create a training manual for NSSD’s IT personnel in which you test, describe, and recommend a variety of network security tools that, when used properly, will mitigate both the risk of future breaches and the effects of a breach when it takes place.
In each section of the training manual, develop guidelines for employees to select and employ specific software, tools, or methods to address the elements of the section topic. Your guidelines serve as recommendations of specific tools and criteria for determining when to use these tools.
Specifically, the following critical elements must be addressed:
Communicate the significance of viewing, displaying, and filtering captured packets.
Explain the significance of alert response procedures to traffic anomalies identified through monitoring network traffic and examining logs.
What to Submit
Fill in Section One of the Training Manual Template document. This section contains two topics in which you will address best practices and tools and methodology. For this assignment, you must follow these formatting guidelines: 12-point Times New Roman font and APA references and citations.

The CISO of the organization reaches out to you, the senior information security

The CISO of the organization reaches out to you, the senior information security officer, and tasks you with creating an agency-wide security awareness program. He states that he will give you all of his support to complete this project (remember, this is the first component of security awareness program). He hands you a security gap analysis (the second component of a security awareness program) that was conducted, which shows 10 major security findings. These 10 deficiencies will serve as the foundation for developing the agency’s security awareness program (see the Case Document for more details on the gap analysis)
Based on the scenario provided in the Case Document, develop the Introduction to your Proposal. In your introduction, be sure to include the purpose of the proposal, address the security concerns of the chief executive officer (CEO), explain why the security awareness proposal will be vital to the organization, describe how the security posture will be addressed, clarify how human factors will be assessed, and list any organizational factors that will contribute to the status of the security posture:
The final project for this course is the creation of a security awareness program proposal. In Module Two, you will take the first step in completing this project by creating the introduction section of your proposal. Begin by reviewing the Case Document, which will provide you with information about the organization for which you are creating the security awareness program proposal. Then, based on the scenario provided in the Case Document, write an introduction to your proposal that addresses the concerns of the chief executive officer and explains why the security awareness proposal will be vital to the organization.
Specifically, the following critical elements must be addressed:
What is the purpose of your proposal? Why is the new security awareness program vital for the organization? Use specific examples to illustrate your claims.
Overall, how would you characterize the security posture of the organization? What were the major findings in your risk assessment of the organization’s current security awareness policies, practices, and processes?
Specifically, are there human factors that adversely affect the security climate within the organization? If so, how? Be sure to consider unintentional and intentional threats to a healthy security culture.
Specifically, are there organizational factors that contribute to an unhealthy security culture in the organization? If so, how? Be sure to consider organizational data flow, work setting, work planning and control, and employee readiness.
What to Submit
Your paper must be submitted as a two- to four-page Word document with double spacing, 12-point Times New Roman font, and one-inch margins, in APA format.
See attached case ….

Assume that your company has suffered a security breach in which it appears that

Assume that your company has suffered a security breach in which it appears that some sensitive information belonging to your clients may have been accessed by unauthorized users. You do not know if the breach resulted from an internal source or an external source. In analyzing your network traffic, address the following in your main post:
Describe the types of traffic you will look at in order to uncover the source of the attack
Explain the tools you are going to use.
After your main post, reply to a minimum of two classmates’ posts and analyze the tools and methods you would use in comparison with those of your fellow learners. Each response must be substantive and advance the discussion while focusing on concepts related to materials in this module.

Gathering requirements and collecting data are important elements in learning ab

Gathering requirements and collecting data are important elements in learning about the organization’s security posture status, and as input to any proposal or action plan for improvements. There are many methods of collecting data and information.
After reading the article Setting the Course PDF on www.pmi.org about gathering and analyzing project requirements, write an initial post in which you share your experience with data collection and requirement gathering for a proposal or project. Align your experience with the importance of how data is collected for security awareness programs. Explain what method you used to collect it. Why did you select this method over others? How does this compare to data collection for security awareness programs? 

Requirements : MS VISIO AND MS ASSESS  The group project requires you to develop

Requirements : MS VISIO AND MS ASSESS 
The group project requires you to develop a database application to solve a real world data management problem. The entire project consists of three deliverables: 1) a project proposal describing the nature of the problem(s), the proposed database solution to the problem(s), and the associated ERD. 2) An updated group proposal with an enhanced database/ERD, a prototype of the application that contains a preliminary Access database and a set of functionalities your database plan to provide, and 3) the final fully functional database application with actual tables loaded with data and working queries.  The project will be completed as a group project with up to 2 students in each group.   
The first deliverable is a proposal in MS Word document (using the attached template) that includes: 1) the description of the business context and the problem(s) that your application is trying to address, 2) a list of the entities involved (with descriptions) and their attributes (with descriptions and data types), 3) business rules that define all the relationships among entities, the constraints, and the attribute domains (if any). Note that each relationship requires 2 business rules (see examples in the template). 4) A tentative ERD with all primary/foreign keys, relationships, and constraints specified, and 5) a brief outline of the functionality of the application (i.e. what the users can do with this application). The proposed ERD should include at least 6 entities (a supertype/subtype hierarchy will count as one entity) and should have at least one of each of the following relationships – 1:1, 1:M, M:N (broken in 1:M through an associative entity), unary relationship, and supertype/subtypes with different overlapping/specialization constraints specified. Please read the attached sample file carefully and ensure all the above requirements are met.
Important: To ensure all group members participate in the group project and avoid free-riding. Every student should independently work on requirements 1), 3), and 4) first and submit the individual proposal to other group members for discussions no later than September 17 (you are encouraged to set an earlier date upon agreement of all group members). The group will then select one ERD and expand it into a group proposal that addresses the above 5 requirements. After the group develops the proposal, all students should submit a word document independently that includes the final group proposal and the individual proposal that contains requirements 1, 3, and 4). Both parts will be considered in the grading of this deliverable. If any student fails to submit their individual proposal to the group, the group should not share the the final proposal with this student and should notify the instructor immediately.
Every student should submit his/her individual proposal (that includes #1, 3 and 4) as well as the group proposal (that include #1 through #5) in one MS Word document, and include separate visio files for their individual ERD and the group ERD. Name the file as Deliverable_1_LastName.docx (and.vsdx). For example, if my proposal was not chosen to be the group proposal, then my 3 files will be named: Deliverable_1_Liu.docx, Deliverable_1_Liu.vsdx (individual ERD)  and Deliverable_1_Liu_Group.vsdx (for the group ERD), respectively. For those whose individual ERD is chosen by the group, please indicate so in the proposal and submit only the first two files.